AvalZ / modsecurity-cliLinks
A CLI wrapper for libmodsecurity (v3.0.10)
☆13Updated 2 years ago
Alternatives and similar repositories for modsecurity-cli
Users that are interested in modsecurity-cli are comparing it to the libraries listed below
Sorting:
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆61Updated 2 months ago
- ☆82Updated last month
- ☆20Updated 9 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆109Updated 2 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84Updated 9 months ago
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- ☆44Updated last year
- source code for the offsecml framework☆44Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 9 months ago
- An Adaptive Misuse Detection System☆46Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- Automated vulnerability discovery and annotation☆68Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆68Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Updated 7 months ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Updated this week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆169Updated last week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- using ML models for red teaming☆45Updated 2 years ago
- ☆137Updated last week
- Create honeypots for cloud environments☆109Updated 4 months ago
- Open-source Fabric templates for cybersecurity and compliance☆31Updated last year
- An example vulnerable app that integrates an LLM☆26Updated last year